• Title/Summary/Keyword: Key size

검색결과 1,797건 처리시간 0.029초

Study on the Magnetic Characteristics of Anisotropic SmCo7-type Alloys Synthesized by High-energy Surfactant-assisted Ball Milling

  • Yu, N.J.;Zhang, P.Y.;Shi, Y.J.;Pan, M.X.;Zhang, S.Y.;Ge, H.L.;Lu, Y.C.
    • Journal of Magnetics
    • /
    • 제19권4호
    • /
    • pp.340-344
    • /
    • 2014
  • An effective process was employed for synthesizing anisotropic magnetic $SmCo_7$-type alloy flakes with high coercivity, which is highly desirable for many applications. The highest coercivity of 16.3 kOe corresponds to a typical flake thickness of 200 nm for the 3-h ball-milled sample. The anisotropy field was calculated by measuring the parallel and perpendicular directions to the easy magnetization direction of the powders. The anisotropy field decreased with the increase of the ball milling time, thus indicating that the decrease of coercivity was mainly caused by the reduction of the anisotropy field. Microstructure analysis indicated that the morphology, grain size, and anisotropy field of these samples have a great influence on the magnetic properties.

Optical Implementation of Triple DES Algorithm Based on Dual XOR Logic Operations

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • 제17권5호
    • /
    • pp.362-370
    • /
    • 2013
  • In this paper, we propose a novel optical implementation of a 3DES algorithm based on dual XOR logic operations for a cryptographic system. In the schematic architecture, the optical 3DES system consists of dual XOR logic operations, where XOR logic operation is implemented by using a free-space interconnected optical logic gate method. The main point in the proposed 3DES method is to make a higher secure cryptosystem, which is acquired by encrypting an individual private key separately, and this encrypted private key is used to decrypt the plain text from the cipher text. Schematically, the proposed optical configuration of this cryptosystem can be used for the decryption process as well. The major advantage of this optical method is that vast 2-D data can be processed in parallel very quickly regardless of data size. The proposed scheme can be applied to watermark authentication and can also be applied to the OTP encryption if every different private key is created and used for encryption only once. When a security key has data of $512{\times}256$ pixels in size, our proposed method performs 2,048 DES blocks or 1,024 3DES blocks cipher in this paper. Besides, because the key length is equal to $512{\times}256$ bits, $2^{512{\times}256}$ attempts are required to find the correct key. Numerical simulations show the results to be carried out encryption and decryption successfully with the proposed 3DES algorithm.

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation

  • Zhang, Mingming;Zhou, Quan;Hu, Yanlang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.404-421
    • /
    • 2020
  • A reversible data hiding scheme in JPEG compressed bitstreams is proposed, which could avoid decoding failure and file expansion by means of removing of bitstreams corresponding to high frequency coefficients and embedding of secret data in file header as comment part. We decode original JPEG images to quantified 8×8 DCT blocks, and search for a high frequency as an optimal termination point, beyond which the coefficients are set to zero. These blocks are separated into two parts so that termination point in the latter part is slightly smaller to make the whole blocks available in substitution. Then spare space is reserved to insert secret data after comment marker so that data extraction is independent of recovery in receiver. Marked images can be displayed normally such that it is difficult to distinguish deviation by human eyes. Termination point is adaptive for variation in secret size. A secret size below 500 bits produces a negligible distortion and a PSNR of approximately 50 dB, while PSNR is also mostly larger than 30 dB for a secret size up to 25000 bits. The experimental results show that the proposed technique exhibits significant advantages in computational complexity and preservation of file size for small hiding capacity, compared to previous methods.

Size Effect of Axial Compressive Strength of CFRP Confined Concrete Cylinders

  • Akogbe, Romuald-Kokou;Liang, Meng;Wu, Zhi-Min
    • International Journal of Concrete Structures and Materials
    • /
    • 제5권1호
    • /
    • pp.49-55
    • /
    • 2011
  • The main objective of this investigation is to study size effect on compressive strength of CFRP confined concrete cylinders subjected to axial compressive loading. In total 24 concrete cylinders with different sizes were tested, small specimens with a diameter of 100 mm and a height of 200 mm, medium specimens with a diameter of 200 mm and a height of 400 mm, and big specimens with a diameter of 300 mm and a height of 600 mm. The lateral confining pressure of each specimen is the same and from that hypothesis the small specimens were confined with one layer of CFRP, medium and big specimens were performed by two and three layers of CFRP respectively. Test results indicate a significant enhancement in compressive strength for all confined specimens, and moreover, the compressive strengths of small and medium specimens are almost the same while a bit lower for big specimens. These results permit to conclude that there is no size effect on compressive strength of confined specimens regardless of cylinder dimension.

Characterization of the PAC Modified Cationic Rosin Size and its Sizing Effect

  • Yan, Yong-Xiang;Chandranupap, Fu-Shan;Wang, Gao-Sheng
    • 한국펄프종이공학회:학술대회논문집
    • /
    • 한국펄프종이공학회 2006년도 PAN PACIFIC CONFERENCE vol.2
    • /
    • pp.387-390
    • /
    • 2006
  • Cationic rosin sizes are prepared by premixing extremely pure ployaluminum chloride (PAC) and dispersed rosin size (DRS). It turned out that zeta potential and particle size of the sizing agents took a big change by Plus90 analyzer's and FTIR analyzer's analysis. It turned out that -C=O and -COOH of the DRS have both chemical reaction with PAC to form the muti-hydroxyl aluminum rosin acid and that the cationic rosin sizes modified by PAC has dissymmetric and symmetric flexible vibration two absorbing peaks of the groups (its absorbing peaks $at1596cm^{-1}\;and\;1425cm^{-1}$). By DRS reacting with PAC, zeta potential of the resin size varied from negative to cationic. $Al_{2}O_{3}/rosin=1:0.3$, zeta potential of premixed admixture is tiptop28.8mv, When joined continuously PAC, zeta potential of cationic rosin sizes descend on the contrary.

  • PDF

Randomized Block Size (RBS) Model for Secure Data Storage in Distributed Server

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4508-4530
    • /
    • 2021
  • Today distributed data storage service are being widely used. However lack of proper means of security makes the user data vulnerable. In this work, we propose a Randomized Block Size (RBS) model for secure data storage in distributed environments. The model work with multifold block sizes encrypted with the Chinese Remainder Theorem-based RSA (C-RSA) technique for end-to-end security of multimedia data. The proposed RBS model has a key generation phase (KGP) for constructing asymmetric keys, and a rand generation phase (RGP) for applying optimal asymmetric encryption padding (OAEP) to the original message. The experimental results obtained with text and image files show that the post encryption file size is not much affected, and data is efficiently encrypted while storing at the distributed storage server (DSS). The parameters such as ciphertext size, encryption time, and throughput have been considered for performance evaluation, whereas statistical analysis like similarity measurement, correlation coefficient, histogram, and entropy analysis uses to check image pixels deviation. The number of pixels change rate (NPCR) and unified averaged changed intensity (UACI) were used to check the strength of the proposed encryption technique. The proposed model is robust with high resilience against eavesdropping, insider attack, and chosen-plaintext attack.

Model for simulating the effects of particle size distribution on the hydration process of cement

  • Chen, Changjiu;An, Xuehui
    • Computers and Concrete
    • /
    • 제9권3호
    • /
    • pp.179-193
    • /
    • 2012
  • The hydration of cement contributes to the performance characteristics of concrete, such as strength and durability. In order to improve the utilization efficiency of cement and its early properties, the particle size distribution (PSD) of cement varies considerably, and the effects of the particle size distribution of cement on the hydration process should be considered. In order to evaluate effects of PSD separately, experiments testing the isothermal heat generated during the hydration of cements with different particle size distributions but the same chemical composition have been carried out. The measurable hydration depth for cement hydration was proposed and deduced based on the experimental results, and a PSD hydration model was developed in this paper for simulating the effects of particle size distribution on the hydration process of cement. First, a reference hydration rate was derived from the isothermal heat generated by the hydration of ordinary Portland cement. Then, the model was extended to take into account the effect of water-to-cement ratio, hereinafter which was referred to as PSD hydration model. Finally, the PSD hydration model was applied to simulate experiments measuring the isothermal heat generated by the hydration of cement with different particle size distributions at different water-to-cement ratios. This showed that the PSD hydration model had simulated the effects of particle size distribution and water-to-cement ratio on the hydration process of cement with satisfactory accuracy.

Oviduct-specific Glycoprotein 1 Locus is Associated with Litter Size and Weight of Ovaries in Pigs

  • Niu, B.Y.;Xiong, Y.Z.;Li, F.E.;Jiang, S.W.;Deng, C.Y.;Ding, S.H.;Guo, W.H.;Lei, M.G.;Zheng, R.;Zuo, B.;Xu, D.Q.;Li, J.L.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제19권5호
    • /
    • pp.632-637
    • /
    • 2006
  • Oviduct-specific glycoprotein 1 (OVGP1) is implicated in playing a role in fertilization and early embryo development. In this study, we have obtained the sequence of intron 9 of OVGP1 gene in swine. Comparative sequencing of Meishan (a native Chinese breed) and Large White pig breeds revealed an A/T substitution at position 943. A PCR-EcoRI-RFLP assay was developed to detect this mutation. Polymorphism analysis in Qingping animals showed that pigs with BB genotype had lower number of piglets born alive (NBA) in multiple parities than pigs with AA (p<0.05) and AB genotype (p<0.01). In Large $White{\times}Meishan$ ($LW{\times}M$) $F_2$ offspring, the weight of both ovaries (OW) of the BB genotype was significantly lighter than that of AB (p = 0.05) and AA (p<0.01) genotypes. Analysis of the data also revealed that the mutation locus affected these two traits mostly by additive effects. These studies indicated that the polymorphism was associated with NBA and OW in two distinct populations and further investigations in more purebreds or crossbreds are needed to confirm these results.

New Constructions of Identity-based Broadcast Encryption without Random Oracles

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.428-439
    • /
    • 2011
  • The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. In this paper, we present a new construction based on the identity. Our construction contains the desirable features, such as constant size ciphertexts and private keys, short public keys and not fixing the total number of possible users in the setup. In addition, the proposed scheme achieves the full security which is stronger than the selective-identity security. Furthermore we show that the proof of security does not rely on the random oracles. To the best our knowledge, it is the first efficient scheme that is full security and achieves constant size ciphertexts and private keys which solve the trade-off between the ciphertext size and the private key size.

소형 정보기기의 화면 디자인에서 최적의 펜입력을 위한 구성요소의 크기와 개수에 대한 경험적 연구 (An Empirical Study of Minimum Required Size and the Minimum Number of Targets for Pen Input on the Small Display)

  • 박정순
    • 디자인학연구
    • /
    • 제17권4호
    • /
    • pp.61-68
    • /
    • 2004
  • 근래 작은 크기의 하드웨어 안에 첨단기능을 탑재한 다양한 ㅎ대용 기기들이 시장에 등장하고 있다. 이러한 기기들은 그 성능을 극대화하기 위하여 서로 다른 입력방법의 특성을 이해하고 충분한 방법안에서 그것들을 활용해야 한다. 본 연구의 목적은 각 입력방법의 특성을 이해함으로서 휴대용 기기의 사용자 인터페이스를 좀 더 효과적으로 디자인할 수 있게 하는 것이다. 이를 위해 본 연구에서는 휴대용 기기의 소형 표시창에서 팬과 커서키를 이용한 타겟 포인팅 수행도를 비교하기 위하여 두가지 실험을 실시하였다. 첫 번째 실험에서 우리는 서로 다른 타겟 크기에서 두가지 입력방법에 의한 타겟 포인팅 수행도를 조사하였다. 타겟의 크기가 5mm보다 작을 경우 펜을 이용한 이력이 하드웨어키를 이용한 입력보다 더 에러가 많지만 타겟크기가 5mm일때 에러율이 키입력과 같은 수준으로 감소한다는 것을 발견했다. 두 번째 실험에서 우리는 타겟의 개수가 미치는 영향을 조사하였다. 그 결과 타겟의 크기가 5mm일때 타겟의 거리가 3단계 경로길이을 초과할 경우 펜 입력이 하드웨어키 입력보다 더 빨리 타겟 포인팅할 수 있다는 것을 알았다.

  • PDF